Vincent Demeester
e1ed8b71f6
Merge pull request #931 from Juliens/addprefix
...
Add Rule AddPrefix
2016-12-21 21:45:09 +01:00
Emile Vauge
6ca142bf20
Merge branch 'master' into addprefix
2016-12-20 22:26:04 +01:00
Rodrigo Menezes
6b20d2a5f3
toml zookeeper doc fix ( #948 )
...
Having that slash there causes traefik to be able to get keys from ZK
2016-12-20 22:25:50 +01:00
Emile Vauge
bef55db120
Merge branch 'master' into addprefix
2016-12-20 12:18:37 +01:00
Emile Vauge
3bb3658d7d
Merge pull request #921 from containous/add-github-issue
...
Add bug command
2016-12-20 11:36:06 +01:00
Julien Salleyron
a4034ce1e2
Add some docs
2016-12-19 17:17:24 +01:00
Julien Salleyron
d9fc66fdbc
Add Rule AddPrefix
2016-12-19 17:12:52 +01:00
Emile Vauge
3ebfd729cf
Refactor StatsRecorder
...
Signed-off-by: Emile Vauge <emile@vauge.com>
2016-12-19 15:24:00 +01:00
Emile Vauge
6adb346cee
Add bug command
...
Signed-off-by: Emile Vauge <emile@vauge.com>
2016-12-19 15:23:59 +01:00
Manuel Laufenberg
318ff52ff3
Merge pull request #969 from Mic92/patch-1
...
deploy.sh: upload release source tarball
2016-12-19 11:13:37 +01:00
Jörg Thalheim
b7b0f8f68d
deploy.sh: upload release source tarball
...
Having a release tarball including all vendor source makes life of maintainers a lot easier to create downstream packages.
It also ensures that as long as the go release is available the software can be build reproducible.
2016-12-17 12:17:05 +01:00
Ian
94bb7a1435
Add ability to set authenticated user in request header ( #889 )
...
* Add ability to set authenticated user in request header
Some web applications provide the ability to authorize users based on
the authenticated from Basic Auth. This patch provides a way to set a
key to which the authenticated user can be set in the Header.
For example, if I set `HeaderValue = "X-WebAuth-User"` and authenticate,
my application will be able to read my user name from that header and
provide me with the proper access.
This fixes #802
2016-12-16 16:42:51 +01:00
Emile Vauge
913a297e8d
Merge pull request #930 from Juliens/defaultFuncMap
...
feat: Add defaultFuncMap to template
2016-12-14 18:41:47 +01:00
Julien Salleyron
d469d426f8
Remove useless func in FuncMaps
2016-12-08 20:44:13 +01:00
Julien Salleyron
ec05fbcf19
feat: Add defaultFuncMap to template
2016-12-08 20:44:13 +01:00
Vincent Demeester
686faf0556
Merge pull request #936 from funkyfuture/getting-started
...
Updates index.md 'Test it!' section
2016-12-08 18:39:04 +01:00
Frank Sachsenheim
fe2d4e0d38
Updates index.md 'Test it!' section
...
adapted to current schema for compose files
uses networks as necessary in a real world usage
2016-12-08 17:01:49 +01:00
Vincent Demeester
c500873586
Merge pull request #932 from yvespp/master
...
Kubernetes: cleanup channel handling
2016-12-08 11:23:20 +01:00
Yves Peter
fc788eb426
Kubernetes: cleanup channel handling
...
Only use one channel for all watches
Re-use stop channel from the provider
Skip events that have already been handled by the provider, builds on 007f8cc48ea9504bb7754c5e3244124be422f47d
2016-12-07 20:12:14 +01:00
Phil Kates
87eac1dc1a
Fix deadlock in k8s provider
...
On a reasonably sized cluster:
63 nodes
87 services
90 endpoints
The initialization of the k8s provider would hang.
I tracked this down to the ResourceEventHandlerFuncs. Once you reach the
channel buffer size (10) the k8s Informer gets stuck. You can't read or
write messages to the channel anymore. I think this is probably a lock
issue somewhere in k8s but the more reasonable solution for the traefik
usecase is to just drop events when the queue is full since we only use
the events for signalling, not their content, thus dropping an event
doesn't matter.
2016-12-07 20:12:14 +01:00
Emile Vauge
91d9b9811f
Merge pull request #738 from tyrken/lego-dns
...
Support Lets Encrypt DNS Challenges
2016-12-07 09:31:49 +01:00
Tristan Keen
71beb4b08f
Support Lets Encrypt DNS Challenges
...
* Add exoscale support for Let’s encrypt DNS challenge
* Use name->DNS provider mapping from lego lib
2016-12-07 01:04:33 +00:00
Emile Vauge
d26f06e2d1
Merge pull request #938 from containous/merge-v1.1.1-master
...
Merge v1.1.1 master
2016-12-06 09:14:39 +01:00
Emile Vauge
dca08af003
Merge v1.1.1 into master
...
Signed-off-by: Emile Vauge <emile@vauge.com>
2016-12-06 08:44:23 +01:00
Darius Karel
4c740e26d7
Clarify exposedbydefault behaviour ( #904 )
...
* docs: clarify exposedbydefault behaviour
* docs: sentence clarity
2016-12-05 11:40:06 +01:00
Vincent Demeester
131f581f77
Merge pull request #836 from yvespp/master
...
Migrate k8s to kubernetes/client-go
2016-12-01 12:00:05 +01:00
Yves Peter
9236a43a4d
kubernetes: moved doc of client to the interface
2016-11-30 19:25:22 +01:00
yvespp
7f4eddf6d6
k8s: changed debug log, removed unneeded stop channels, increased watch channel buffer
2016-11-30 19:16:48 +01:00
Ed Robinson
d1e631a487
Flatten dependencies
...
Deps for the integration suite are handled seperately, and not
flattend, as glide can't read the version info from docker/docker
2016-11-30 19:16:48 +01:00
Yves Peter
0b78375211
Kubernetes client: set resync period to 5 minutes for more robustness
2016-11-30 19:16:48 +01:00
Yves Peter
15540764a0
Switched Kubernetes provider to new client implementation: https://github.com/kubernetes/client-go
2016-11-30 19:16:48 +01:00
Vincent Demeester
82234cbbb2
Merge pull request #862 from Juliens/eureka
...
test-integration(eureka): Add some integration tests
2016-11-29 23:00:50 +01:00
Emile Vauge
22392daef7
Merge branch 'master' into eureka
2016-11-29 19:04:43 +01:00
Emile Vauge
7f3ae6edb0
Merge pull request #915 from containous/prepare-release-v1.1.1
...
Prepare release v1.1.1
2016-11-29 16:25:52 +01:00
Emile Vauge
1a993f5dfb
Prepare release v1.1.1
...
Signed-off-by: Emile Vauge <emile@vauge.com>
2016-11-29 14:52:55 +01:00
Emile Vauge
4e527304d0
Merge pull request #908 from containous/fix-swarm-panic
...
Fix Swarm panic
2016-11-29 14:47:51 +01:00
Emile Vauge
841be8d806
Fix Swarm panic
2016-11-28 16:46:37 +01:00
Ryan Leary
055cd01bb7
Fix GroupsAsSubDomains option for Mesos and Marathon ( #868 )
...
* Fix GroupsAsSubDomains option for Mesos and Marathon
* Refactor reverseStringSlice function
2016-11-28 14:59:08 +01:00
Emile Vauge
e34c364d5e
Merge pull request #900 from containous/fix-k8s-panic
...
Fix k8s panic
2016-11-28 12:19:52 +01:00
Emile Vauge
926eb099f1
Fix k8s client panic
...
Signed-off-by: Emile Vauge <emile@vauge.com>
2016-11-24 19:19:10 +01:00
Emile Vauge
710508dc40
Fix digest auth doc
2016-11-24 18:17:57 +01:00
Alexander Block
b4ea68b88a
Fix missing value for k8s watch request parameter ( #874 )
...
Fixes: 732
2016-11-23 23:21:09 +01:00
WTFKr0
2bf9acd95e
Normalize backend even if is user-defined ( #865 )
...
Signed-off-by: WTFKr0 <thomas.kovatchitch@gmail.com>
2016-11-23 21:31:37 +01:00
Kristian Klausen
a8cb905255
consul/kv.tmpl: weight default value should be a int ( #826 )
...
* consul/kv.tmpl: weight default value should be a int
Fix #821
* Use 0 as default weight in all backends
2016-11-23 14:49:55 +01:00
Lewis Headden
567387aee0
Enable TCP Keep Alive for Marathon Client and make value configurable ( #784 )
...
* Resolve rebase conflicts
* Fix imports that VSCode messed up
2016-11-22 16:11:28 +01:00
Julien Salleyron
5b71e3184a
fix: lint
2016-11-20 18:34:42 +01:00
Julien Salleyron
e1724444ac
test(integration-test): Integration test for eureka
2016-11-20 18:25:48 +01:00
Julien Salleyron
cf8940e80e
fix(eureka): Wrong host in rule
2016-11-20 18:25:48 +01:00
Emile Vauge
fe1b982d13
Merge pull request #856 from containous/prepare-release-v1.1.0
...
Changelog v1.1.0
2016-11-17 22:41:11 +01:00
Emile Vauge
221ae2427b
changelog v1.1.0
2016-11-17 22:07:15 +01:00